diff --git a/mtp-configs/ovh-core-rtr01.turnsys.net b/mtp-configs/ovh-core-rtr01.turnsys.net index 88f8e5b..dfec20e 100644 --- a/mtp-configs/ovh-core-rtr01.turnsys.net +++ b/mtp-configs/ovh-core-rtr01.turnsys.net @@ -1,1256 +1,896 @@ - - 15.8 - - - normal - ovh-core-rtr01 - turnsys.net - - all - - system - 1998 - - - admins - - system - 1999 - 0 - page-all - - - admin - - system - admins - $2b$10$7JpSzVedN7s.PnnMwkAy3.0J6sKliUJerfIL1HlY64kaPVSrZ8c9u - 0 - user-shell-access - 2 - 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 - - pfSense.css - - - 2000 - 2000 - pfv-ucs.turnsys.net ovh-ucs.turnsys.net satx-ucs.turnsys.net - - https - - 59344eda4e727 - 2 - - 2 - pfSense.css - - - - - hadp - hadp - hadp - - monthly - - America/Chicago - - enabled - - 115200 - serial - enabled - - - - - - yes - - - en_US - none - 10.253.3.201 - - - - - - em0 - - - - 00:50:56:00:d6:9d - 158.69.183.161 - 29 - WANGW - - - - vtnet0 - - - 10.253.9.254 - 24 - - - - vtnet1 - - - 10.253.3.254 - 24 - - - - vtnet2 - - - 10.253.6.254 - 24 - - - - vtnet3 - - - 10.253.7.254 - 24 - - - - vtnet4 - - - 10.253.44.254 - 24 - - - - - - - 10.253.9.10 - 10.253.9.244 - - - - - - - ::1000 - ::2000 - - assist - medium - - - - OVH - prodtechopsalerts@turnsys.com - kn3lmgmt - - - - - - - - - - 161 - - 162 - - opt1 - - - - - - 50 - 10.253.3.99 - - - - ipv4 - - - - - - automatic - - - - - - - -
158.69.183.165
- 443 -
- tcp - 10.253.9.78 - 443 - wan - - nat_597cd1cc065ba8.01190462 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - -
158.69.183.163
- 443 -
- tcp - 10.253.9.80 - 443 - wan - - nat_597cf3dd295c23.13339274 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - -
158.69.183.165
- 80 -
- tcp - 10.253.9.78 - 80 - wan - - nat_597cd1ed051541.16634797 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - - wanip - 80 - - tcp - 10.253.9.79 - 80 - wan - - nat_597cd453ac8360.78302498 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - - - - - - - -
158.69.183.163
- 80 -
- tcp - 10.253.9.80 - 80 - wan - - nat_597cf3be0f90f7.84639417 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - - wanip - 443 - - tcp - 10.253.9.79 - 443 - wan - - nat_597cd476a20e84.00129509 - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - - -
- - - - - - wan - tcp - -
10.253.9.78
- 443 -
- - nat_597cd1cc065ba8.01190462 - 1501352396 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.78
- 80 -
- - nat_597cd1ed051541.16634797 - 1501352429 - - - NAT Port Forward - -
- - - 1501352532 - pass - wan - inet - - - - - - - - keep state - - tcp - - - - -
158.69.183.165
- 443 -
- - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - - - wan - tcp - -
10.253.9.79
- 80 -
- - nat_597cd453ac8360.78302498 - 1501353043 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.79
- 443 -
- - nat_597cd476a20e84.00129509 - 1501353078 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.80
- 80 -
- - nat_597cf3be0f90f7.84639417 - 1501361086 - - - NAT Port Forward - -
- - - - - wan - tcp - -
10.253.9.80
- 443 -
- - nat_597cf3dd295c23.13339274 - 1501361117 - - - NAT Port Forward - -
- - pass - inet - - lan - 0100000101 - - lan - - - - - - - pass - inet6 - - lan - 0100000102 - - lan - - - - - - - - 1496615387 - pass - openvpn - inet - - - - - - - - keep state - - -
172.16.80.0/24
- - - - - - - - admin@10.253.9.2 - - - - admin@172.16.80.2 - -
- - - 1498336605 - pass - openvpn - inet - - - - - - - - keep state - - -
192.168.120.0/30
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1496615599 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.100.0/24
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1498339856 - pass - openvpn - inet - - - - - - - - keep state - - -
192.168.197.0/30
- - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - -
- - - 1505584953 - pass - openvpn - inet - - - - - - - - keep state - - -
10.40.50.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1508046007 - pass - openvpn - inet - - - - - - - - keep state - - -
10.40.100.0/24
- - - - - - - - admin@10.40.50.17 - - - - admin@10.40.50.17 - -
- - - 1505665799 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.30.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1505666009 - pass - openvpn - inet - - - - - - - - keep state - - -
10.251.22.0/24
- - - - - - - - admin@10.251.100.101 - - - - admin@10.251.100.101 - -
- - - 1496707746 - pass - opt1 - inet - - - - - - - - keep state - - - opt1 - - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - - - - - 1496707927 - pass - opt2 - inet - - - - - - - - keep state - - - opt2 - - - - - - - - admin@172.16.80.2 - - - - admin@172.16.80.2 - - - - - - - - -
- - - - - - - 1,31 - 0-5 - * - * - * - root - /usr/bin/nice -n20 adjkerntz -a - - - 1 - 3 - 1 - * - * - root - /usr/bin/nice -n20 /etc/rc.update_bogons.sh - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 webConfiguratorlockout - - - 1 - 1 - * - * - * - root - /usr/bin/nice -n20 /etc/rc.dyndns.update - - - */60 - * - * - * - * - root - /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot - - - 30 - 12 - * - * - * - root - /usr/bin/nice -n20 /etc/rc.update_urltables - - - - - - - - - ICMP - icmp - - - - - TCP - tcp - - - - - HTTP - http - - - / - - 200 - - - - HTTPS - https - - - / - - 200 - - - - SMTP - send - - - - 220 * - - - - - system_information:col1:show,interfaces:col2:show - 10 - - - - - - 1 - UDP - tun - - wan - - 158.69.183.162 - 1194 - - - - none - - - - p2p_shared_key - subnet - - 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 - AES-128-CBC - SHA1 - none - 192.168.194.0/30 - - - - - - - - - - 1 - - - - - - - - - - - - - - - - - admin@10.40.50.77 - - - 59344eda4e727 - - server - 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 - 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 - - - - - wan - 158.69.183.166 - WANGW - 1 - - - - - - - OpenBGPD - - 0.11_9 - https://doc.pfsense.org/index.php/OpenBGPD_package - openbgpd.xml - - - iperf - http://www.freshports.org/benchmarks/iperf/ - - 2.0.5.5_3 - https://doc.pfsense.org/index.php/Iperf_package - iperf.xml - - - nmap - - 1.4.4_1 - https://doc.pfsense.org/index.php/Nmap_package - nmap.xml - - - mtr-nox11 - - http://www.bitwizard.nl/mtr/ - 0.85.6_1 - mtr-nox11.xml - - - ntopng - http://www.ntop.org/ - - 0.8.6_1 - ntopng.xml - true - - - softflowd - http://code.google.com/p/softflowd/ - - 1.2.2 - softflowd.xml - - - OpenBGPD -
Services
- /pkg_edit.php?xml=openbgpd.xml&id=0 -
- - iperf Client - Run iperf in client mode. -
Diagnostics
- /pkg_edit.php?xml=iperf.xml -
- - iperf Server - Run iperf in server mode. -
Diagnostics
- /pkg_edit.php?xml=iperfserver.xml -
- - NMap -
Diagnostics
- nmap.xml -
- - mtr -
Diagnostics
- /pkg_edit.php?xml=mtr-nox11.xml -
- - ntopng Settings - Set ntopng settings such as password and port. -
Diagnostics
- /pkg_edit.php?xml=ntopng.xml -
- - ntopng - Access ntopng -
Diagnostics
- /ntopng_redirect.php -
- - softflowd - Modify softflowd settings. -
Services
- softflowd.xml - /pkg_edit.php?xml=softflowd.xml -
- - bgpd - bgpd.sh - bgpd - - - - iperf - iperf - - mwexec("/usr/bin/killall iperf"); - - - ntopng - ntopng.sh - ntopng - - - - softflowd - softflowd.sh - softflowd - - - - - - - - 64522 - - yes - 192.168.194.2 - 192.168.194.2 - none - - 10.253.0.0/24 - - - 10.253.1.0/24 - - - 10.253.2.0/24 - - - 10.253.3.0/24 - - - 10.253.5.0/24 - - - 10.253.6.0/24 - - - 10.253.7.0/24 - - - 10.253.8.0/24 - - - 10.253.9.0/24 - - - - - - - 192.168.194.1 - - - - - remote-as - 64517 - - - - - - enabled - lan,opt1,opt2,opt3,opt4,wan - 10.253.3.99 - 9996 - - - 9 - full - 300 - 100 - 300 - 100 - 10 - 10 - 100 - - -
- - - - ipalias - wan - 5935fb59669c7 - - single - 29 - 158.69.183.164 - - - ipalias - wan - 5935fba3df38c - - single - 29 - 158.69.183.165 - - - ipalias - wan - 597ce7c0c0655 - - single - 29 - 158.69.183.163 - - - - - - - PHP-Growl - pfSense growl alert - - - tsys-cloud-www.turnsys.net - 25 - prodtechopsalerts@turnsys.com - - - PLAIN - ovh-core-rtr01@turnsys.net - - - - lan - yes - yes - - - - 128 - - - -
+ + opnsense + + + Disable the pf ftp proxy handler. + debug.pfftpproxy + default + + + Increase UFS read-ahead speeds to match current state of hard drives and NCQ. More information here: http://ivoras.sharanet.org/blog/tree/2010-11-19.ufs-read-ahead.html + vfs.read_max + default + + + Set the ephemeral port range to be lower. + net.inet.ip.portrange.first + default + + + Drop packets to closed TCP ports without returning a RST + net.inet.tcp.blackhole + default + + + Do not send ICMP port unreachable messages for closed UDP ports + net.inet.udp.blackhole + default + + + Randomize the ID field in IP packets (default is 0: sequential IP IDs) + net.inet.ip.random_id + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.sourceroute + default + + + + Source routing is another way for an attacker to try to reach non-routable addresses behind your box. + It can also be used to probe for information about your internal networks. These functions come enabled + as part of the standard FreeBSD core system. + + net.inet.ip.accept_sourceroute + default + + + + Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects + to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect + packets without returning a response. + + net.inet.icmp.drop_redirect + default + + + + This option turns off the logging of redirect packets because there is no limit and this could fill + up your logs consuming your whole hard drive. + + net.inet.icmp.log_redirect + default + + + Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway) + net.inet.tcp.drop_synfin + default + + + Enable sending IPv4 redirects + net.inet.ip.redirect + default + + + Enable sending IPv6 redirects + net.inet6.ip6.redirect + default + + + Enable privacy settings for IPv6 (RFC 4941) + net.inet6.ip6.use_tempaddr + default + + + Prefer privacy addresses and use them over the normal addresses + net.inet6.ip6.prefer_tempaddr + default + + + Generate SYN cookies for outbound SYN-ACK packets + net.inet.tcp.syncookies + default + + + Maximum incoming/outgoing TCP datagram size (receive) + net.inet.tcp.recvspace + default + + + Maximum incoming/outgoing TCP datagram size (send) + net.inet.tcp.sendspace + default + + + Do not delay ACK to try and piggyback it onto a data packet + net.inet.tcp.delayed_ack + default + + + Maximum outgoing UDP datagram size + net.inet.udp.maxdgram + default + + + Handling of non-IP packets which are not passed to pfil (see if_bridge(4)) + net.link.bridge.pfil_onlyip + default + + + Set to 1 to additionally filter on the physical interface for locally destined packets + net.link.bridge.pfil_local_phys + default + + + Set to 0 to disable filtering on the incoming and outgoing member interfaces. + net.link.bridge.pfil_member + default + + + Set to 1 to enable filtering on the bridge interface + net.link.bridge.pfil_bridge + default + + + Allow unprivileged access to tap(4) device nodes + net.link.tap.user_open + default + + + Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid()) + kern.randompid + default + + + Maximum size of the IP input queue + net.inet.ip.intr_queue_maxlen + default + + + Disable CTRL+ALT+Delete reboot from keyboard. + hw.syscons.kbd_reboot + default + + + Enable TCP extended debugging + net.inet.tcp.log_debug + default + + + Set ICMP Limits + net.inet.icmp.icmplim + default + + + TCP Offload Engine + net.inet.tcp.tso + default + + + UDP Checksums + net.inet.udp.checksum + default + + + Maximum socket buffer size + kern.ipc.maxsockbuf + default + + + + normal + ovh-core-rtr01 + turnsys.net + + admins + System Administrators + system + 1999 + 0 + user-shell-access + page-all + + + root + System Administrator + system + admins + $2b$10$k7UpLMTFYZHVQqDpnlXr1.tMDVslyuzDVWfvMg9.MNwC1SydPyxoy + 0 + + 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 + + + + 2000 + 2000 + America/Chicago + 0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org + + http + 5acd29581b4ba + + + + + + yes + 1 + 1 + 1 + 1 + 1 + 1 + hadp + hadp + hadp + + monthly + + 1 + 60 + aesni + 1 + 1 + en_US + 10.253.3.201 + 8.8.8.8 + 8.8.4.4 + 115200 + video + + 1 + lan,opt1 + enabled + 1 + + basic + + + + + none + none + none + none + none + none + none + none + + + + em0 + WAN + 1 + + 1 + 1 + 158.69.183.161 + 29 + GW_WAN + + + + + + vtnet0 + TSYS + 1 + + 10.253.9.252 + 24 + + + + + + + vtnet1 + mgmt + 1 + + 10.253.3.252 + 24 + + + + + + + 1 + 1 + openvpn + OpenVPN + group + 1 + + + + + + + 10.253.9.10 + 10.253.9.244 + + + + + on + + + + + public + + + + + + + automatic + + + tcp + wan + inet + Allow HTTP to tsys-cloud-www + + + + pass + 10.253.9.80 + 80 + + 1 + + +
158.69.183.163
+ 80 +
+ + root@10.251.100.101 + + /firewall_nat_edit.php made changes + + + root@10.40.50.77 + + /firewall_nat_edit.php made changes + +
+ + tcp + wan + inet + Allow HTTPS to tsys-cloud-www + + + + pass + 10.253.9.80 + 443 + + 1 + + +
158.69.183.163
+ 443 +
+ + root@10.251.100.101 + + /firewall_nat_edit.php made changes + + + root@10.40.50.77 + + /firewall_nat_edit.php made changes + +
+
+ + + pass + wan + inet + keep state + tcp + + 1 + + +
158.69.183.163
+ 443 +
+ + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + wan + inet + keep state + tcp + + 1 + + +
158.69.183.163
+ 80 +
+ + root@10.251.100.101 + + /firewall_rules_edit.php made changes + + + root@10.251.100.101 + + /firewall_rules_edit.php made changes + +
+ + pass + inet + Default allow LAN to any rule + lan + + lan + + + + + + + pass + inet6 + Default allow LAN IPv6 to any rule + lan + + lan + + + + + + + pass + openvpn + inet + keep state + + 1 + + + 1 + + + root@10.253.9.2 + + /firewall_rules_edit.php made changes + + + root@10.253.9.2 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet6 + keep state + Default allow LAN IPv6 to any rule + + opt1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet + keep state + Default allow LAN to any rule + + opt1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + + pass + opt1 + inet + keep state + Allow traffic to management VLAN + + 1 + + + 1 + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + + root@10.40.50.77 + + /firewall_rules_edit.php made changes + + +
+ + + + + + ICMP + icmp + ICMP + + + + TCP + tcp + Generic TCP + + + + HTTP + http + Generic HTTP + + / + + 200 + + + + HTTPS + https + Generic HTTPS + + / + + 200 + + + + SMTP + send + Generic SMTP + + + 220 * + + + + + 0.opnsense.pool.ntp.org + + + system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show + 2 + + + root@10.40.50.77 + + /firewall_virtual_ip_edit.php made changes + + + + + + + + + + + + + wan + v9 + + + + 0 + + + + + + + + + 0 + 0 + 0 + wan + 192.168.0.0/16,10.0.0.0/8,172.16.0.0/12 + + + W0D23 + 4 + ac + 0 + 0 + + + + + 0 + + + + 1 + 1 + + + + + + 0 + on + strip + 1 + 0 + admin@localhost.local + + + + 0 + /var/squid/cache + 256 + + 100 + 16 + 256 + 0 + 0 + + + + 0 + 2048 + 1024 + 1024 + 256 + + + + lan + 3128 + 3129 + 0 + 0 + + + 4 + 5 + + 2121 + 0 + 1 + 0 + + + + + + + + + 80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http + 443:https + + + + + + + 0 + icap://[::1]:1344/avscan + icap://[::1]:1344/avscan + 1 + 0 + 0 + X-Username + 1 + 1024 + 60 + + + + + OPNsense proxy authentication + 2 + 5 + + + + + + + + + + + 1 + 64522 + 10.253.9.0/24,10.253.3.0/24,192.168.194.0/30 + + + + 1 +
192.168.194.1
+ 64517 + openvpn + 0 + 0 + + + + +
+
+ + + +
+ + 1 + 0 + notifications + 0 + notifications + +
+
+ + 5acd29581b4ba + Web GUI SSL certificate + LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUZiekNDQTFlZ0F3SUJBZ0lKQUlNTlZ4N1QzSWM3TUEwR0NTcUdTSWIzRFFFQkN3VUFNRTR4Q3pBSkJnTlYKQkFZVEFrNU1NUlV3RXdZRFZRUUlEQXhhZFdsa0xVaHZiR3hoYm1ReEZUQVRCZ05WQkFjTURFMXBaR1JsYkdoaApjbTVwY3pFUk1BOEdBMVVFQ2d3SVQxQk9jMlZ1YzJVd0hoY05NVGd3TkRFd01qRXhOVEEwV2hjTk1Ua3dOREV3Ck1qRXhOVEEwV2pCT01Rc3dDUVlEVlFRR0V3Sk9UREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXcKRXdZRFZRUUhEQXhOYVdSa1pXeG9ZWEp1YVhNeEVUQVBCZ05WQkFvTUNFOVFUbk5sYm5ObE1JSUNJakFOQmdrcQpoa2lHOXcwQkFRRUZBQU9DQWc4QU1JSUNDZ0tDQWdFQTFiaDZkSEdTZkRSZU55YzhGbis2b0dEa3ltbmp6YWhCCkM4Z1JpWDMwWWR3SVBYcWhpYllLQmdkWVFZZDRoNGgzWERPelllMmxZZVRVYUVaZkRsVkxqV2FyL0hMYW5HODMKQW04eE9MdXdwQmdGc0lNTGZUR0FEcUJDd1BaMDlnU0UwT0t1dkdFUGoyNkg4eWhNeDNXT2VvVGJ2RENKMVdCYgpvQjFSTDJmVG1GbkdxMTZTSTJpVDc2VndBM3BUQXlFb1pmRllmeGRMSTBpbmp5dnU3aWNCQVBNU09pWXowbVJXClVZZDNHKzUrcmI0QkVkSXl3TGpDRzd2SjdYQTJlWXJlZTY3YlpTeTVqNVc0eXpjTFJNbkZzZGMrb1EwR3dJanIKVFowQzYvZWowUWpWbE5ERFNQaGM0dkJaZ2xWMTJlL3FtekN0MnNPYzVxS3Zyc1JtckNGL3RSelV5cU9ZaGt2eAp2c0huODVnTmswS05YbEkwUGNWM2NhTWo0RlJVNXI3clpEb0hnTi9UTFpFaUVmVUJXMFlJM25FSUZrY3VyVngyCm5KNWNxWjBZK1NiSk1BZzVPYUhWcTZxRWhsdEExa1BvQWllcXBhQjdzb2lDT0hQZ08rQ09YNUlCK1FMM2h2dmMKMHc0YUplNEErS0ROS21ReVRpQ21JYXdrU0l0V2Fka1lUMFNnVjVnMUJKYnRQdnJKZytOM1dpN3dKdkxqOXVnZQovVWx0V3VPeXM3eXQyWDRIbFdWQXdUSC9XMEN3enVaUXpsbk02ODJHdThacGxMWGt6OU1DVFRkbm5oQnErRXllCnJrM3lONk4zRWZSMTN2T2lyM1VWcEVVVkVvSm9sRERGNERpMDQxR3BWU25xVFVBeUs2aGQxQVpFYXVVd1RyeUkKSDZtMWwrVUIvdHNDQXdFQUFhTlFNRTR3SFFZRFZSME9CQllFRlA3OWZLUU5sM0VWaGdLdm8xOFNqd3NGWDBjcgpNQjhHQTFVZEl3UVlNQmFBRlA3OWZLUU5sM0VWaGdLdm8xOFNqd3NGWDBjck1Bd0dBMVVkRXdRRk1BTUJBZjh3CkRRWUpLb1pJaHZjTkFRRUxCUUFEZ2dJQkFGZ245NlYrMEhqRlFtaEd5RDZBM1lXenByaitiZkd1RWZCcmZhcUMKbVd2NTM4TVlTOEE2MWswMEhOZjZoZUZISUpWSzI1akN6dXZDMC8rZmJGRForZmtkcllNUFNjNzBOQm9oOFJnaApxTDNoOW9KenR4bEVCbkc2Z3lQdG1ISDVYbW1mZmYzWTU0U0ljT0x0c3BTWlNUVDlMbUpNcm4wNmhRbE5Cd3Z3Cm1XWXBqTklMRWJSN1BWN3ZtZjQ3MW1OTmVqczZSK2Y2Z2RpMDdCcVl6YVppWldsdGZFb2FsNk5qRFRUUUhTdEUKcVlVSGpXWHZGU0g5SVRjdzN3QVRjdGVZVW8rOFI1dWEvNmhMUEViMERUeUo3Y0FuZDFjNVpwK1lEUzRDcDd2dgowdVFybDliNWtKdWYrWDUzL3lMMmNMK1dDdFJsU0tKOW9kV1NzRlRqLzhLUTBWNUJOcGFqcnE2dnp2c2FVaTNqCkk2Z0dFVlphak9YQVdYdmxhWDdLQXduSi9EZzVmUmFXT0oxTmpuSFZibFNsbWRPdWh3cHVJM0cyc3hsaDIxa28KQkZiOVo0V3ZoODBEWXBxQnRScEFpRDRaMGVkOCtLelkzQ0NyQzBOS1pUVjhPbFRmRWZlSzdxNzRDbmMyQmJhSwp5UUI2SlVlRVU1VVd5K1paQkNrM2kzN3dBcmhyc0UwU1B4N2ZKUXJQZlNpbUQxZE0wcHcrdExZMDFQaUxudlZTCk9SaEw0S09NMDAydVhBUW1CbDZBMXlGRjBsMzhwR1cvbFNDNktId3lnQ0Znb2hHYnFsQmw3eDM1czR0Vkoyak4KdEpXRFdWYmt4eFZEbFFGbW5DTURzbzBEaFBBbGJNbVJ0OC8yeEx5cVRsV2F1SGpvZ3B5dStpdmhrOXcvc3VGUQpkSndXCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K + 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 + + + + + vtnet0 + 9 + 0 + tsys + vtnet0_vlan9 + + + vtnet1 + 3 + 0 + mgmt + vtnet1_vlan3 + + + + + Interface WAN Gateway + 1 + inet + wan + 158.69.183.166 + 1 + GW_WAN + 1 + 1 + + + Interface WAN Gateway + 1 + inet + wan + 158.69.183.166 + 1 + GW_WAN + 1 + 1 + + + + + UDP + tun + 158.69.183.162 + 1194 + none + ASN2NET Backbone + p2p_shared_key + AES-128-CBC + SHA1 + none + 192.168.194.0/30 + 1 + wan + 1 + + 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 + + + + + + single + 29 + carp + wan + tsys-cloud-www + 158.69.183.163 + 1 + 0 + 1 + 123 + + + single + 24 + carp + lan + floating gw tsys + 10.253.9.254 + 2 + 0 + 1 + vip123 + + + single + 24 + carp + opt1 + toolbox/ucs + 10.253.3.254 + 3 + 0 + 1 + c0l0rad0 + + +